EP3741148A1 - Method for determining a key for securing communication between a user apparatus and an application server - Google Patents
Method for determining a key for securing communication between a user apparatus and an application serverInfo
- Publication number
- EP3741148A1 EP3741148A1 EP19703167.7A EP19703167A EP3741148A1 EP 3741148 A1 EP3741148 A1 EP 3741148A1 EP 19703167 A EP19703167 A EP 19703167A EP 3741148 A1 EP3741148 A1 EP 3741148A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- user equipment
- key
- authentication
- server
- application server
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
- 238000000034 method Methods 0.000 title claims abstract description 94
- 238000004891 communication Methods 0.000 title claims abstract description 68
- 238000010295 mobile communication Methods 0.000 claims abstract description 35
- 238000009795 derivation Methods 0.000 claims abstract description 23
- 238000012795 verification Methods 0.000 claims description 14
- 238000004364 calculation method Methods 0.000 claims description 11
- 230000003750 conditioning effect Effects 0.000 claims description 10
- 230000004044 response Effects 0.000 claims description 7
- 230000001960 triggered effect Effects 0.000 claims description 4
- 230000006870 function Effects 0.000 description 57
- 230000015654 memory Effects 0.000 description 15
- 230000008901 benefit Effects 0.000 description 6
- 238000013523 data management Methods 0.000 description 6
- 238000007726 management method Methods 0.000 description 6
- 238000012545 processing Methods 0.000 description 3
- 230000005540 biological transmission Effects 0.000 description 2
- 230000010354 integration Effects 0.000 description 2
- 230000008569 process Effects 0.000 description 2
- 238000013475 authorization Methods 0.000 description 1
- 238000004590 computer program Methods 0.000 description 1
- 238000011161 development Methods 0.000 description 1
- 230000003287 optical effect Effects 0.000 description 1
- 230000011664 signaling Effects 0.000 description 1
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
- H04W12/069—Authentication using certificates or pre-shared keys
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/041—Key generation or derivation
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/04—Key management, e.g. using generic bootstrapping architecture [GBA]
- H04W12/043—Key management, e.g. using generic bootstrapping architecture [GBA] using a trusted network node as an anchor
- H04W12/0431—Key distribution or pre-distribution; Key agreement
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04W—WIRELESS COMMUNICATION NETWORKS
- H04W12/00—Security arrangements; Authentication; Protecting privacy or anonymity
- H04W12/06—Authentication
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2463/00—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00
- H04L2463/061—Additional details relating to network architectures or network communication protocols for network security covered by H04L63/00 applying further key derivation, e.g. deriving traffic keys from a pair-wise master key
Definitions
- the invention relates to the general field of telecommunications.
- the invention relates more particularly to a technique for determining a key intended to secure a communication between a user equipment and an application server.
- the technique of determining a key is in the field of mobile communication networks.
- GBA Generic Bootstrapping Architecture
- 3GPP in the context of a mobile network, for example fourth generation.
- This architecture is defined in the technical specification referenced 3GPP TS 33.220 version VI 5.1.0, entitled “Generic Authentication Architecture (GAA); Generic Bootstrapping Architecture (GBA) (Release 15) ".
- GBA Generic Authentication Architecture
- GBA Generic Bootstrapping Architecture
- BSF Bootstrapping Server Function
- this key Ks_NAF is derived from the master key Ks by applying a key derivation function KDF (for "Key Derivation Function") to key derivation parameters. These parameters include an identifier of the application server NAF_Id and the random number RAND used during authentication.
- KDF Key Derivation Function
- the terminal and the BSF function share a key Ks_NAF intended to be used to secure the exchanges between the terminal and the application server NAF.
- Fe application server NAF requests the key Ks_NAF associated with the transaction identifier B_TID BSF function. Fe terminal and the application server NAF can then communicate securely using the key Ks_NAF.
- the mobile network operator is an intermediary who uses the secrets shared between the home subscriber system (HSS) and the security module embedded in the terminal to guarantee the security of the link between the subscriber system.
- HSS home subscriber system
- NAF application server and the UE terminal without these two entities need to share a secret.
- One of the aims of the invention is to remedy the shortcomings / disadvantages of the state of the art and / or to make improvements thereto.
- the subject of the invention is a method for determining a key intended to secure a communication between a user equipment and an application server.
- the method comprises at the level of the user equipment:
- a secret master key being generated during said authentication by the user equipment and the authentication server;
- the method for determining a key intended to secure a communication between a user equipment and an application server comprises at the authentication server level:
- a secret master key being generated during said authentication by the user equipment and the authentication server;
- the key for securing communication between the user equipment and the application server is derived from a master key generated during an authentication implemented by the authentication server of the communication network. mobile.
- the technique is thus implemented by an authentication server that is already integrated and therefore interfaced in the mobile communication network, in particular with the user data management server. It is not necessary to provide a specialized server, called boot server, to determine this key.
- the calculation of the key is performed independently of the authentication: a random is used to calculate the key independently of that used for authentication.
- the master key and the derived key are thus decoupled, distinct hazards having been used. It is thus possible to derive as many keys as necessary, provided that the master key is not expired. Once the key is derived, the key remains valid even if the master key has been modified. Secure communication using the calculated key can then be established between the user equipment and the application server.
- the authentication server provides the application server the key that it has calculated.
- this authentication is triggered during a registration of the user equipment with the mobile communication network.
- a K AUSF master key is determined by the user equipment and the server implementing the Authentication Server Function (AUSF).
- AUSF Authentication Server Function
- EAP-AKA EAP-AKA 'authentication
- the K AUSF master key is determined from an Extended Session Session Key (EMSK).
- EMSK Extended Session Session Key
- the K AUSF master key is derived from encryption and integrity keys.
- the specification document TS 33.501 in its current version, in particular in section 6.2.2.1, indicates that the authentication server can store this K AUSF master key generated between the authentication procedure and the inter-entity key agreement procedures. of the mobile communication network and the user equipment.
- This same specification document also indicates in paragraph 6.2.1 in an editorial note that when the authentication server stores this K AUSF master key, the need or not for the user equipment to memorize it is for further study. It is understood that to implement the proposed determination technique K AUSF master key must be stored by both the authentication server and the user equipment.
- This K AUSF master key being used to derive a key intended to secure a communication between a user equipment and an application server, it is not necessary to implement a new authentication procedure specific to this communication with the application server, contrary to what is required in the current GBA procedure. This therefore avoids soliciting the security element of the user equipment each time the user equipment wishes to communicate with an application server.
- This technique is also simple to implement in a 5 G mobile communication network, to the extent that it is sufficient to integrate a new service with the authentication server. The latter then exposes this new service and can be contacted by an application server to determine the key for securing communication between the user equipment and the application server.
- the user equipment sends the application server an access request and receives from the application server a proof prepared by the authentication server and intended for the user equipment, a verification of said proof by the user equipment conditioning the sending of the key request.
- the authentication server provides the application server with prepared proof for the user equipment, said proof being intended to be sent by the application server to the user equipment in response to an access request sent by the user server.
- user equipment a verification of said proof by the user equipment conditioning the sending of the key request to the authentication server.
- An authentication token includes for example this proof.
- This proof prepared by the authentication server and provided by the application server to the user equipment, allows the latter to verify that the application server is authorized and this before any key derivation at the user equipment.
- the user equipment derives the key even before ensuring that the application server is authorized. The latter may not have been authorized by the BSF server and may not have the derived key.
- the application server receives prepared proof for the user equipment and sends this proof to the user equipment, a verification of said proof by the user equipment.
- user equipment conditioning the sending of the key request to the authentication server.
- the authentication server verifies that it has calculated a key intended to secure a communication between said user equipment and said application server, said verification conditioning the sending to the user equipment of the hazard.
- the user equipment does not derive a key when the application server has not previously requested the authentication server for this user equipment.
- the invention relates to a user equipment, arranged to communicate with an application server via a mobile communication network, this equipment comprising:
- an authentication module for the user equipment by an authentication server of the mobile communication network a secret master key being generated during said authentication by the user equipment and the authentication server;
- a module sending the user equipment to the authentication server of a key request to communicate with the application server; a module for calculating a key intended to secure a communication between the user equipment and the application server by means of a key derivation function applied to at least one randomness, a user identifier and a server identifier; application using the master key, said random having been received by the user equipment of the authentication server.
- This user equipment can of course include in structural terms the various features relating to the method of determining a key as described above, which can be combined or taken separately.
- the invention relates to an authentication server of a mobile communication network, this authentication server comprising:
- an authentication module designed to authenticate a user equipment, a secret master key being generated during said authentication by the user equipment and the authentication server;
- a module for calculating a key intended to secure a communication between the user equipment and the application server said key being calculated by means of a key derivation function applied to at least one hazard, an identifier of user and an identifier of the application server using the master key.
- This authentication server can of course include in structural terms the various characteristics relating to the method of determining a key as described above, which can be combined or taken separately.
- the invention relates to a system for determining a key intended to secure a communication between a user equipment and an application server, this system comprising at least one user equipment according to the second aspect and an authentication server according to the third aspect ..
- the system further comprises the application server, said application server comprising a communication module, arranged to receive the authentication server said key.
- the invention relates to a program for a user equipment, comprising program code instructions intended to control the execution of those of the steps of the method of determining a previously described key implemented by the equipment. user, when this program is executed by this equipment and a recording medium readable by a user equipment on which a program for a user equipment is recorded.
- the invention relates to a program for an authentication server, comprising program code instructions intended to control the execution of those of the steps of the method of determining a previously described key implemented by the authentication server, when this program is executed by this server and a recording medium readable by a server on which is recorded a program for a server.
- FIG. 1 represents a mobile communication network in which the method for determining a key in a particular embodiment is implemented
- FIG. 2 illustrates steps of a method for determining a key intended to secure a communication between a user equipment and an application server according to a particular embodiment
- Figure 3 shows a user equipment in a particular embodiment
- FIG. 4 represents an authentication server in a particular embodiment
- FIG. 5 represents an application server in a particular embodiment.
- FIG. 1 represents a mobile communication network in which the method for determining a key in a particular embodiment is implemented.
- FIG. 1 represents the architecture of the fifth generation system (5 G) in a mobile communication network in the course of standardization, in a case where the user equipment is in its nominal network. It corresponds to Figure 4.2.3-1 of the 3GPP specification document TS 23.501 V2.0.1 (2017-12), entitled “System Architecture for the 5G System; Stage 2 (Release 15) ".
- This 5G system architecture includes a plurality of network functions, which are more particularly described functionally in section 6 of this specification document TS 23.501. The different acronyms for these network functions are detailed in the Appendix. Only the network functions contributing to the implementation of the method for determining a K AF key intended to secure a communication between a user equipment UE (for "User Equipment”) and an application server AF (for " Function Application ").
- a secure communication must be established between a user equipment 10 and an application server 40 in order to implement an application.
- UE user equipment also called terminal, is arranged to access a mobile communication network, shown in Figure 1.
- the conventional architecture of such a user equipment usually distinguishes a runtime environment including a suitable operating system for the execution of user applications, a runtime environment responsible for network communications and called “baseband”, and a security element (the term usually used is the term “Secure Element”).
- the security element is of the “Universal Integrated Circuit Card” (UICC) type, or "eUICC” (for embedded or embedded).
- UICC Universal Integrated Circuit Card
- eUICC embedded or embedded
- An example of a security module is a "USIM” card (“Universal Suscriber Identity Module”) inserted into a user equipment and used in mobile telephony.
- the security element is arranged to store and process sensitive data, for example a network access application and associated authentication data (referred to as "credentials" in English), such as keys and cryptographic algorithms. . Such data is intended to be used by an authentication protocol with the network when accessing the latter.
- sensitive data for example a network access application and associated authentication data (referred to as "credentials" in English), such as keys and cryptographic algorithms.
- credentials such as keys and cryptographic algorithms.
- Such data is intended to be used by an authentication protocol with the network when accessing the latter.
- the security element of the user equipment is a secure software area, arranged to process the network access sensitive data.
- the user equipment is a mobile device, for example a smartphone-type smart terminal, a tablet, etc.
- the user of the user equipment has subscribed to an operator for a subscription allowing him to access the mobile network of the operator.
- the user equipment 10 comprises security data which constitute a network access profile.
- a network access profile includes a set of data that provides secure access to the network. More specifically, the access profile comprises at least one identifier of the user equipment 10, an identifier of the network to which it can access through its subscription, and data intended to be used during the authentication phase with the network. , such as an authentication key, usually denoted K.
- the user equipment 10 accesses the network entities via an access network denoted (R) AN in FIG. 1. This access network comprises base stations, arranged to manage the transmission and the radio reception with the user equipment 10.
- This 5G system architecture is service-based. Specifically, architectural elements are defined as network functions that provide their services through interfaces to a development infrastructure common to other network functions that are authorized to use them.
- a Network Repository Function (NRF) allows each network function to discover the services offered by other network functions.
- NEF for "Network Exposure Function”
- the NEF stores the received information as structured data using a standardized interface with a unified data repository (UDR).
- UDR unified data repository
- the mobile communication network comprises in particular a UDM (Unified Data Management) unified data management server, referenced 30.
- This management server 30 implements in particular the following functionalities:
- SUPI identifier for Subscription Permanent Identifier
- the mobile communication network also comprises an Authentication Server Function (AUSF) authentication server, referenced 20, adapted to authenticate the user equipments.
- AUSF Authentication Server Function
- the security module of the user equipment 10 stores an authentication key, usually denoted K, shared with the unified data management server 30.
- K authentication is intended to be used for the generation of authentication data and to derive keys such as a key K AUSF , K seaf , KAMF and keys encryption signaling, data in the user plane, control radio resources and so-called intermediate keys.
- the key hierarchy is shown in Figure 6.2.1-1 of the 3GPP specification document TS 33.501 V0.6.0 (2017-12) "Security Architecture and Procedures for 5G System (Release 15)".
- a random RAND is used.
- the master key K A USF is a secret key shared between the authentication server 20 and the user equipment 10. In the embodiment described, these two devices store this master key K A USF after a procedure authentication.
- the K AUSF master key is determined from an Extended Session Session Key (EMSK) by the user equipment 10 and the authentication server 20. More precisely, paragraph 6.1.3.1 of document TS 33.501 describes more precisely this authentication procedure EAP-AKA '.
- the master key K AUSF is determined from CK / IK keys (for "Ciphering Key” and "Integrity Key”) by the user equipment 10 and the authentication server 20.
- the master key K AUSF is derived from the CK / IK keys, as specified in paragraph A.2 of Annex A of TS 33.501, by implementing a key derivation function KDF (for "Key Derivation Function") to input parameters.
- KDF key derivation Function
- the KDF key derivation function corresponds to the function specified in the 3GPP specification document TS 33.220 V15.1.0 (2018-01) "Generic Authentication Architecture (GAA); Generic Bootstrapping Architecture (GBA) (Release 15) ".
- GAA Generic Authentication Architecture
- GBA Generic Bootstrapping Architecture
- an UE_AF_comm service is exposed by the authentication server 20, noted for example Nausf_UE_AF_comm (request), in addition to the Nausf_UEAuthentication service.
- Nausf is the name given to the interface between the AUSF authentication server and other network functions.
- the UE_AF_comm service is exposed by the application server 40, noted for example Naf_UE_AF_comm (UE_ausf_notify). Naf is the name given to the interface between the AF application server and the other functions of the network.
- the services exposed by the different network functions are detailed in the specification document 3GPP TS 23.502 V2.0.0 (2017-12) "Procedures for the 5G System; Stage 2 (Release 15) ".
- the application server 40 can be managed by the operator of the mobile communication network as well as by a third party.
- a system 1 for determining a key intended to secure a communication between a user equipment and an application server comprises at least one user equipment 10 and an authentication server 20.
- the system 1 further comprises the application server 40.
- the method for determining a key intended to secure a communication between a user equipment and an application server, implemented by the user equipment 10, the application server 40 and the authentication server 20, will now be described in relation with Figure 2.
- An authentication procedure is implemented by the user equipment 10 in a step E1 and by the authentication server 20 in a step G1 during a registration of the user equipment with the mobile communication network.
- a secret master key K AUSF is generated by the user equipment 10 and the authentication server 20 from a random RAND1.
- the user equipment 10 stores in a storage memory 105 the generated master key K AUSF .
- the authentication server 20 stores in storage memory 205 the master key K AUSF generated.
- the user equipment 10 sends in a step E2 to the application server 40 an access request Ml.
- This access request Ml comprises in particular:
- the communication network for example the country code of the MCC network - Mobile Country Code - and the mobile network code MNC - Mobile Network Code -
- the communication network for example the country code of the MCC network - Mobile Country Code - and the mobile network code MNC - Mobile Network Code -
- This identifier UEn j is different from the subscriber identifier SUPI but the network operator is arranged to associate this user identifier UEn j with the subscriber identifier SUPI for a given connection.
- This user identifier UEn j is in a particular embodiment allocated by the network operator.
- the user identifier UL n comprises the information making it possible to identify the communication network.
- the UL n identifier takes the form of name.rienom@orange.fr. Such an identifier makes it possible to identify the user equipment and to identify the operator Orange. It is then possible to deduce the network identifier MCC 208 and MNC 01.
- This message Ml is received by the application server 40 in a step F1. Still during this step F1, the application server 40 determines the network identifier and sends a request M2 to the authentication server 20 of the communication network. identified operator, via the server in charge of the NEF exposure function if necessary.
- This request M2 comprises in particular an identifier of the application server AFn j and optionally a required validity period ExpireTime ⁇ .
- the identifier of the application server AI ; n for example, corresponds to "service.fr".
- This request M2 is received by the authentication server 20 in a step G2.
- the authentication server 20 calculates a key K AF intended to secure the communication between the user equipment 10 and the application server 40 by means of the key derivation function KDF applied from the master key K A USF-
- the input string S comprises in particular the user ID UE ID , a validity period ExpireTime A us F , an identifier of the application server AF n , and a random RAND2.
- the latter is chosen by the authentication server 20 and has no link with the random RAND1 used during the authentication procedure.
- the ExpireTime AUSF validity period is determined by the authentication server 20.
- the authentication server 20 prepares an AF authentication token autn , including the identifier of the application server AF n) and a proof P to the user equipment.
- This proof P corresponds to the result of a function f using as input the master key K AUSF , the application server identifier AF n) and the validity period ExpireTime AUSF :
- This function f is chosen to protect against a replay.
- the authentication token AF AUTN corresponds to AF n , Il f (K AUSF, AF n ,. ExpireTime AUSF ) where II corresponds to the concatenation operator.
- the application server identifier AFn j is in clear.
- the authentication server 20 then stores in association with the master key K AUSF and the subscriber identifier SUPI, in particular the user ID UE ID and the application server identifier AFn j .
- the authentication server 20 notifies the application server 40 by a message M3 comprising the key K AF and the authentication token AF autn .
- the authentication server 20 provides the application server 40 with the calculated key K AF and the proof prepared for the user equipment 10, this proof being intended to be sent by the application server 40 to the user equipment 10. response to the access request Ml sent by the user equipment.
- the message M3 includes the ExpireT validity period AUSF .
- This message M3 is received by the application server 40 in a step F2.
- the application server 40 derives two keys K AFenc for the encryption and K AFmt for integrity protection from K AF -
- the application server 40 sends a message M4 to the user equipment 10 in response to the access request Ml received in step F1.
- This message M4 includes in particular the authentication token AFAUTN as well as, if applicable, the validity period ExpireTime A us F ⁇ It is emphasized here that the exchanges between the user equipment 10 and the server application 40 are protected by network keys, because the user equipment 10 is authenticated to the network.
- the user equipment 10 receives the message M4 and verifies the proof of the authentication token AF A UTO- This proof allows the user equipment 10 to verify that the application server 40 identified has been in relation with the authentication server 20 and that it has the key K AF ⁇ This makes it possible to verify that the application server 40 is authorized and this before any key derivation at the user equipment 10.
- the verification of the proof by the user equipment 10 conditions the sending of the K AF key request to the authentication server 20.
- the user equipment 10 terminates the method for determining a key K AF .
- a step E4 the user equipment 10 sends the authentication server 20 a key request message M5 to communicate with the application server 40.
- This message M5 notably comprises its user identifier UE. ⁇ and the application server identifier LI ; P. It is emphasized here that the exchanges between the user equipment 10 and the authentication server 20 are protected by network keys, since the user equipment 10 is authenticated to the network.
- This key request message M5 is received by the authentication server 20 in a step G3.
- the authentication server then verifies that it has already calculated a K AF key for securing the communication between the user equipment 10 and the application server 40 with the information stored in step G2.
- This verification conditions the sending to the user equipment 10 of the hazard RAND2.
- the authentication server 20 terminates the method of determining a key.
- the authentication server 20 sends a response message M6 to the user equipment 10.
- This message M6 comprises in particular the user identifier UE ⁇ , the validity period ExpireTime A us F, the application server identifier LI ; P and the random RAND2 that was used by the authentication server 20 to calculate the key K A F-
- a step E5 the user equipment 10 receives the message M6 and calculates the key K AF by derivation of the master key K A USF in the manner described in Step G2 to the authentication server 20.
- the user equipment 10 derives two keys KAFenc for encryption and KAH U I for integrity protection from the key KAF ⁇
- the user equipment 10 has calculated a key K AF intended to secure a communication with the application server 40.
- the latter also has this key K AF obtained from the authentication server.
- the determination of this key has been made without performing new authentication, so without requesting the security element of the user equipment again.
- a communication is then established between the user equipment 10 and the application server 40 secured by means of the key K AF, limited if necessary by the validity period of ExpireTime A us F ⁇
- this determination method integrates with a method of establishing a secure communication between a user equipment and an application server.
- a key K AI can thus be determined for each communication with an application server.
- a new service Nausf_UE_AF_comm (request) is created on the authentication server.
- the method thus relies on an existing authentication server and is therefore already integrated in the network of the operator. This method can thus be more easily implemented than the prior art GBA. This method is also easily implemented at the level of the user equipment.
- a service Naf_UE_AF_comm (UE_ausf_notitfy) is created on the application server. There is no exchange between the authentication server and the unified data management server UDM for the implementation of the method, which relies on an authentication that has already been executed. The cost of deploying such a method is thus low.
- the described embodiment comprises a preparation by the authentication server of a proof intended for the user equipment.
- This proof is provided by the application server to the user equipment and verified by the latter.
- the preparation of such proof and its verification are not implemented in another particular embodiment.
- the described embodiment defines input parameters of the key derivation function. It is emphasized here that in some embodiments, some of these parameters may be absent or else other parameters may be added.
- this technique of determining a key simplifies the procedure for securing communication between a user equipment and an application server. Once the user equipment authenticated with the authentication server of its mobile network operator, it is easy to determine this key by removing the constraints of the prior art GBA. The integration of this technique into a 5 G mobile communication network is also facilitated.
- FIG. 3 schematically illustrates a user equipment 10 in a particular embodiment.
- the user equipment 10 comprises in particular:
- a communication module 101 forming a communication interface with a mobile communication network, arranged to communicate with devices of a communication network, for example with an authentication server and an application server;
- a memory zone 105 arranged to store a program which comprises code instructions for implementing steps of the determination method
- a storage memory 106 arranged to store data used during the implementation of the determination method
- the user equipment also includes:
- an authentication module 102 of the user equipment by an authentication server 20 of the mobile communication network, a secret master key being generated during said authentication by the user equipment and the authentication server;
- a calculation module 103 of a key intended to secure a communication between the user equipment and the application server by means of a key derivation function applied to at least one randomness, a user identifier and an identifier of the key; application server using the master key, said hazard having been received by the user equipment of the authentication server;
- connection module 104 arranged to establish a secure communication with an application server 40 by means of a key K AF
- the communication module 101 is in particular arranged to send the authentication server a key request to communicate with the application server.
- the storage memory 106 is in particular arranged to store the master key K AUSF determined during an authentication procedure. In a particular embodiment, this authentication procedure is triggered during a registration of the user equipment with the mobile communication network.
- the communication module 101 is arranged in particular to send the application server an access request and to receive from the application server a proof prepared by the authentication server and intended for the user equipment.
- the calculation module 103 is then arranged to verify this evidence, this verification conditioning the sending of the key request.
- the calculation module 103 is designed to derive two K AFenc keys for encryption and K AHUI for integrity protection from K AF. It is emphasized here that the user equipment 10 also comprises other processing modules, not shown in FIG. 3, arranged to implement the various functions of this user equipment.
- Figure 4 schematically illustrates an authentication server 20 in a particular embodiment.
- the authentication server 20 of a mobile communication network comprises in particular:
- a communication module 201 forming a communication interface with a mobile communication network, arranged to communicate with devices of a communication network, for example with a user equipment and an application server;
- a memory zone 204 arranged to store a program which comprises code instructions for implementing steps of the determination method
- a storage memory 205 arranged to store data used during the implementation of the determination method.
- the authentication server 20 also comprises:
- an authentication module 202 designed to authenticate a user equipment, a secret master key being generated during said authentication by the user equipment and the authentication server;
- the communication module 201 is in particular arranged to receive a key request sent by the user equipment to communicate with an application server and to send to the user equipment a random.
- the communication module 201 is also arranged to provide the application server with the calculated key.
- the storage memory 205 is in particular arranged to store the master key K AUSF determined during an authentication procedure. In a particular embodiment, this authentication procedure is triggered during a registration of the user equipment with the mobile communication network.
- the calculation module 203 is in particular arranged to prepare a proof for the user equipment.
- the communication module 201 is then arranged to provide this proof to the application server, so that the latter sends it to the user equipment in response to an access request sent by the user equipment, a verification of this proof by the user equipment conditioning the sending of the key request to the authentication server.
- the storage memory 205 is arranged to store in association with the master key K A USF and the subscriber identifier SUPI, in particular the user ID UE ID and the application server identifier. LI ; P.
- the calculation module 203 is in particular arranged to verify that it has calculated a key intended to secure a communication between a user equipment and an application server, this verification conditioning the sending to the user equipment of hazard. This check includes in particular a consultation of the storage memory 205.
- the authentication server comprises a module arranged to expose the UE_AF_Comm service, as described above.
- the authentication server 20 also comprises other processing modules, not shown in FIG. 4, arranged to implement the different functions of this authentication server.
- Figure 5 schematically illustrates an application server 40 in a particular embodiment.
- the application server 40 comprises in particular:
- a communication module 401 forming a communication interface with a mobile communication network, arranged to communicate with devices of a communication network, for example with a user equipment and an authentication server;
- a memory zone 404 arranged to store a program which comprises code instructions for implementing steps of the determination method
- a storage memory 405 designed to store data used during the implementation of the determination method.
- the application server 40 also comprises:
- a module 402 for determining a network identifier arranged to determine from an access request Ml received from a user equipment a network identifier
- connection module 403 arranged to establish a secure communication with the user equipment 10 by means of a key K AF .
- the communication module 401 is in particular arranged to receive an access request Ml sent by the user equipment and to send a request M2 to the authentication server 20 of the communication network of the identified operator.
- the module communication 401 is also arranged to receive a key K AF for securing communication with the user equipment.
- the communication module 401 is arranged to receive from the authentication server a prepared proof for the user equipment 10 and to send this proof to the user equipment 10 in response to the request of Ml access sent by the user equipment.
- the application server 40 further comprises a calculation module, arranged to derive two keys K AFenc for encryption and K AI ml for integrity protection from K ⁇ .
- the storage memory 405 is arranged to store in association with the user identifier UE ro the key K AF .
- the application server comprises a module arranged to expose the UE_AF_Comm service, as described above.
- the application server 40 also comprises other processing modules, not shown in FIG. 5, arranged to implement the various functions of this application server.
- module may correspond in this document to both a software component, a hardware component or a set of hardware and / or software components, capable of implementing a function or a set of functions, as described above for the module concerned.
- a software component corresponds to one or more computer programs, one or more subroutines of a program, or more generally to any element of a program or software.
- Such a software component is stored in memory and then loaded and executed by a data processor of a physical entity and is able to access the hardware resources of this physical entity (memories, recording media, communication buses, electronic cards of a physical entity). input / output, user interfaces, etc.).
- a material component corresponds to any element of a material set (or hardware). It may be a programmable hardware component or not, with or without an integrated processor for running software. This is for example an integrated circuit, a smart card, an electronic card for executing a firmware, etc.
- the modules 101, 102, 103, 104 are arranged to implement steps of the determination method described above, implemented by the user equipment.
- These are preferably software modules comprising software instructions for executing those of the steps (or actions) of the determination method described above, implemented by a user equipment.
- the invention therefore also relates to: a program for a user equipment, comprising program code instructions intended to control the execution of those of the steps (or actions) of the determination method described above, when said program is executed by this user equipment;
- the modules 201, 202, 203 are arranged to implement steps of the determination method described above, implemented by the authentication server.
- These are preferably software modules comprising software instructions for executing those of the steps (or actions) of the determination method described above, implemented by an authentication server.
- the invention therefore also relates to:
- a program for an authentication server comprising program code instructions intended to control the execution of those of the steps (or actions) of the determination method described above, when said program is executed by this authentication server;
- a recording medium readable by an authentication server on which the program for a server is recorded.
- the modules 401, 402, 403 are arranged to implement steps of the determination method described above, implemented by the application server.
- These are preferably software modules comprising software instructions for executing those of the steps (or actions) of the determination method described above, implemented by an application server.
- the invention therefore also relates to:
- a program for an application server comprising program code instructions intended to control the execution of those of the steps (or actions) of the determination method described above, when said program is executed by this application server;
- a recording medium readable by an application server on which the program for a server is recorded.
- the software modules can be stored in or transmitted by a data carrier.
- a data carrier This may be a hardware storage medium, for example a CD-ROM, a magnetic diskette or a hard disk, or a transmission medium such as an electrical signal, optical or radio, or a telecommunications network.
- AUSF Authentication Server Function
- AMF Access and Mobility Management Function
- DN Network - Data Network
- NEF Network Exposure Function
- NSSF Network Slice Function Selection
- PCF Policy Control Function
- SMF Session Management Function
- UDM Unified Data Management
- UPF User Plane Function
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
Claims
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR1850440A FR3077175A1 (en) | 2018-01-19 | 2018-01-19 | TECHNIQUE FOR DETERMINING A KEY FOR SECURING COMMUNICATION BETWEEN USER EQUIPMENT AND AN APPLICATION SERVER |
PCT/FR2019/050056 WO2019141924A1 (en) | 2018-01-19 | 2019-01-11 | Method for determining a key for securing communication between a user apparatus and an application server |
Publications (2)
Publication Number | Publication Date |
---|---|
EP3741148A1 true EP3741148A1 (en) | 2020-11-25 |
EP3741148B1 EP3741148B1 (en) | 2022-05-04 |
Family
ID=62167479
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP19703167.7A Active EP3741148B1 (en) | 2018-01-19 | 2019-01-11 | Technique for determining a key for securing communication between a user equipment and an application server |
Country Status (7)
Country | Link |
---|---|
US (1) | US11895487B2 (en) |
EP (1) | EP3741148B1 (en) |
JP (1) | JP7301852B2 (en) |
KR (1) | KR102632519B1 (en) |
CN (1) | CN111630882B (en) |
FR (1) | FR3077175A1 (en) |
WO (1) | WO2019141924A1 (en) |
Families Citing this family (7)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US11538031B2 (en) | 2017-03-31 | 2022-12-27 | Vijay Madisetti | Method and system for identity and access management for blockchain interoperability |
CN116097690A (en) * | 2020-08-07 | 2023-05-09 | 华为技术有限公司 | Method and related device in universal guide architecture |
US11652646B2 (en) * | 2020-12-11 | 2023-05-16 | Huawei Technologies Co., Ltd. | System and a method for securing and distributing keys in a 3GPP system |
US11956627B2 (en) * | 2021-02-19 | 2024-04-09 | Nokia Technologies Oy | Securing user equipment identifier for use external to communication network |
CN114039771B (en) * | 2021-11-08 | 2023-12-29 | 阿波罗智联(北京)科技有限公司 | Data processing method, device and system, electronic equipment and storage medium |
WO2023208183A2 (en) * | 2022-04-29 | 2023-11-02 | 中国移动通信有限公司研究院 | Information transmission method, and device |
KR102626310B1 (en) * | 2022-11-17 | 2024-01-18 | 주식회사 아이티어뱅크 | Management Account Creation Method of the Solution Management Target System and the System |
Family Cites Families (47)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1276363C (en) * | 2002-11-13 | 2006-09-20 | 深圳市朗科科技有限公司 | Method of actualizing safety data storage and algorithm storage in virtue of semiconductor memory device |
DE10307403B4 (en) * | 2003-02-20 | 2008-01-24 | Siemens Ag | Method for forming and distributing cryptographic keys in a mobile radio system and mobile radio system |
US8726023B2 (en) * | 2005-02-03 | 2014-05-13 | Nokia Corporation | Authentication using GAA functionality for unidirectional network connections |
GB0504865D0 (en) * | 2005-03-09 | 2005-04-13 | Nokia Corp | User authentication in a communications system |
DE102005026982A1 (en) * | 2005-06-10 | 2006-12-14 | Siemens Ag | Method for agreeing a security key between at least one first and a second communication subscriber for securing a communication connection |
US20070101122A1 (en) * | 2005-09-23 | 2007-05-03 | Yile Guo | Method and apparatus for securely generating application session keys |
WO2007062689A1 (en) * | 2005-12-01 | 2007-06-07 | Telefonaktiebolaget Lm Ericsson (Publ) | Method and apparatus for distributing keying information |
JP5123209B2 (en) | 2006-01-24 | 2013-01-23 | ▲ホア▼▲ウェイ▼技術有限公司 | Method, system, and authentication center for authentication in end-to-end communication based on a mobile network |
EP1835688A1 (en) * | 2006-03-16 | 2007-09-19 | BRITISH TELECOMMUNICATIONS public limited company | SIM based authentication |
DE102006036109B4 (en) * | 2006-06-01 | 2008-06-19 | Nokia Siemens Networks Gmbh & Co.Kg | Method and system for providing a mesh key |
EP1865656A1 (en) * | 2006-06-08 | 2007-12-12 | BRITISH TELECOMMUNICATIONS public limited company | Provision of secure communications connection using third party authentication |
CN101102186B (en) * | 2006-07-04 | 2012-01-04 | 华为技术有限公司 | Method for implementing general authentication framework service push |
EP2039199B1 (en) * | 2006-07-06 | 2018-10-31 | Nokia Technologies Oy | User equipment credential system |
US8094817B2 (en) * | 2006-10-18 | 2012-01-10 | Telefonaktiebolaget Lm Ericsson (Publ) | Cryptographic key management in communication networks |
CN101207477A (en) * | 2006-12-19 | 2008-06-25 | 中兴通讯股份有限公司 | Method for multi-network guard end-to-end conversation cryptographic key negotiation of striding field |
US10091648B2 (en) * | 2007-04-26 | 2018-10-02 | Qualcomm Incorporated | Method and apparatus for new key derivation upon handoff in wireless networks |
EP2183898B1 (en) * | 2007-07-05 | 2016-09-14 | Coherent Logix Incorporated | Mobile television broadcast system |
US9198033B2 (en) * | 2007-09-27 | 2015-11-24 | Alcatel Lucent | Method and apparatus for authenticating nodes in a wireless network |
CN102111759A (en) * | 2009-12-28 | 2011-06-29 | 中国移动通信集团公司 | Authentication method, system and device |
KR101683883B1 (en) * | 2009-12-31 | 2016-12-08 | 삼성전자주식회사 | Method and system for supporting security in mobile telecommunication system |
US8296836B2 (en) * | 2010-01-06 | 2012-10-23 | Alcatel Lucent | Secure multi-user identity module key exchange |
US9608971B2 (en) * | 2011-09-08 | 2017-03-28 | Telefonaktiebolaget Lm Ericcson (Publ) | Method and apparatus for using a bootstrapping protocol to secure communication between a terminal and cooperating servers |
AP3955A (en) * | 2011-10-31 | 2016-12-22 | Nokia Corp | Security mechanism for external code |
US8893244B2 (en) * | 2011-11-30 | 2014-11-18 | Verizon Patent And Licensing Inc. | Application-based credential management for multifactor authentication |
US9232391B2 (en) * | 2012-05-07 | 2016-01-05 | Industrial Technology Research Institute | Authentication system for device-to-device communication and authentication method therefor |
FR2992811A1 (en) * | 2012-07-02 | 2014-01-03 | France Telecom | ESTABLISHING A SECURITY ASSOCIATION WHEN ATTACHING A TERMINAL TO AN ACCESS NETWORK |
ES2680152T3 (en) * | 2012-08-03 | 2018-09-04 | OneSpan International GmbH | Authentication method and device convenient for the user using a mobile authentication application |
KR102142576B1 (en) * | 2013-05-16 | 2020-08-10 | 삼성전자주식회사 | Method and apparatus for discovery of device-to-device communications |
WO2015037926A1 (en) * | 2013-09-11 | 2015-03-19 | Samsung Electronics Co., Ltd. | Method and system to enable secure communication for inter-enb transmission |
KR102232121B1 (en) * | 2013-11-14 | 2021-03-25 | 삼성전자주식회사 | Apparatus and method for maintaining a security key in a device to device communication system |
US9413759B2 (en) * | 2013-11-27 | 2016-08-09 | At&T Intellectual Property I, Lp | Apparatus and method for secure delivery of data from a communication device |
US9870395B2 (en) * | 2014-03-21 | 2018-01-16 | Pearson Education, Inc. | Conditioned transmission of query responses and connection assessments |
US9491618B2 (en) * | 2014-09-26 | 2016-11-08 | Qualcomm Incorporated | Serving network authentication |
US20160127903A1 (en) * | 2014-11-05 | 2016-05-05 | Qualcomm Incorporated | Methods and systems for authentication interoperability |
US10237729B2 (en) * | 2015-03-05 | 2019-03-19 | Qualcomm Incorporated | Identity privacy in wireless networks |
US9717003B2 (en) * | 2015-03-06 | 2017-07-25 | Qualcomm Incorporated | Sponsored connectivity to cellular networks using existing credentials |
US9717004B2 (en) * | 2015-03-17 | 2017-07-25 | Qualcomm Incorporated | Apparatus and method for sponsored connectivity to wireless networks using application-specific network access credentials |
SG11201901885PA (en) * | 2016-07-07 | 2019-04-29 | Nokia Solutions & Networks Oy | Machine type communication using mobile originated short messaging service without mobile station international subscriber directory number |
US10516994B2 (en) * | 2016-07-17 | 2019-12-24 | Qualcomm Incorporated | Authentication with privacy identity |
US10433163B2 (en) * | 2016-09-19 | 2019-10-01 | Qualcomm Incorporated | Techniques for deriving security keys for a cellular network based on performance of an extensible authentication protocol (EAP) procedure |
US10009768B2 (en) * | 2016-11-03 | 2018-06-26 | Blackberry Limited | Requesting system information |
US10708267B2 (en) * | 2017-07-19 | 2020-07-07 | Mediatek Inc. | Method and associated processor for authentication |
CN109560919B (en) * | 2017-09-27 | 2021-02-09 | 华为技术有限公司 | Key derivation algorithm negotiation method and device |
US11190510B2 (en) * | 2017-11-15 | 2021-11-30 | Parallel Wireless, Inc. | Two-factor authentication in a cellular radio access network |
WO2020146974A1 (en) * | 2019-01-14 | 2020-07-23 | Telefonaktiebolaget Lm Ericsson (Publ) | Method and apparatus for security |
US20230057968A1 (en) * | 2020-01-31 | 2023-02-23 | Sony Group Corporation | User equipment, non-public network authentication-authorization-accounting server, authentication server function entity |
US11652646B2 (en) * | 2020-12-11 | 2023-05-16 | Huawei Technologies Co., Ltd. | System and a method for securing and distributing keys in a 3GPP system |
-
2018
- 2018-01-19 FR FR1850440A patent/FR3077175A1/en not_active Withdrawn
-
2019
- 2019-01-11 CN CN201980009127.0A patent/CN111630882B/en active Active
- 2019-01-11 KR KR1020207021111A patent/KR102632519B1/en active IP Right Grant
- 2019-01-11 JP JP2020539705A patent/JP7301852B2/en active Active
- 2019-01-11 US US16/962,329 patent/US11895487B2/en active Active
- 2019-01-11 EP EP19703167.7A patent/EP3741148B1/en active Active
- 2019-01-11 WO PCT/FR2019/050056 patent/WO2019141924A1/en unknown
Also Published As
Publication number | Publication date |
---|---|
CN111630882B (en) | 2024-01-23 |
EP3741148B1 (en) | 2022-05-04 |
WO2019141924A1 (en) | 2019-07-25 |
US11895487B2 (en) | 2024-02-06 |
KR102632519B1 (en) | 2024-01-31 |
FR3077175A1 (en) | 2019-07-26 |
JP7301852B2 (en) | 2023-07-03 |
JP2021510984A (en) | 2021-04-30 |
KR20200110345A (en) | 2020-09-23 |
CN111630882A (en) | 2020-09-04 |
US20200344603A1 (en) | 2020-10-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
EP3741148B1 (en) | Technique for determining a key for securing communication between a user equipment and an application server | |
US11824981B2 (en) | Discovery method and apparatus based on service-based architecture | |
US11228442B2 (en) | Authentication method, authentication apparatus, and authentication system | |
EP1683388B1 (en) | Method for managing the security of applications with a security module | |
CN107690771B (en) | Method, device and system for certificate management | |
EP3523998B1 (en) | Method for mutual authentication between user equipment and a communications network | |
US9380038B2 (en) | Bootstrap authentication framework | |
US20150281958A1 (en) | Method and Apparatus for Securing a Connection in a Communications Network | |
FR3053203A1 (en) | TECHNIQUE FOR DOWNLOADING A PROFILE OF ACCESS TO A NETWORK | |
JP2013529019A (en) | Wireless network authentication device and method | |
US8234497B2 (en) | Method and apparatus for providing secure linking to a user identity in a digital rights management system | |
AU2015416630B2 (en) | Methods and arrangements for authenticating a communication device | |
FR3013177A1 (en) | SECURE ACCESS CONFIGURATION TECHNIQUE OF A GUEST TERMINAL TO A HOST NETWORK | |
JP2016021765A (en) | Method and apparatus for authenticated user-access to kerberos-enabled application based on authentication and key agreement (aka) mechanism | |
CN113569210A (en) | Distributed identity authentication method, equipment access method and device | |
EP3456025B1 (en) | Technique for authenticating a user device | |
US20090136043A1 (en) | Method and apparatus for performing key management and key distribution in wireless networks | |
FR3111038A1 (en) | Cryptographic processing to encrypt or decrypt data | |
CN113569209B (en) | User registration method and device based on block chain | |
EP2146534A1 (en) | Hybrid authentication method, system, server and terminal |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: UNKNOWN |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE INTERNATIONAL PUBLICATION HAS BEEN MADE |
|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: REQUEST FOR EXAMINATION WAS MADE |
|
17P | Request for examination filed |
Effective date: 20200723 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
AX | Request for extension of the european patent |
Extension state: BA ME |
|
DAV | Request for validation of the european patent (deleted) | ||
DAX | Request for extension of the european patent (deleted) | ||
RAP3 | Party data changed (applicant data changed or rights of an application transferred) |
Owner name: ORANGE |
|
GRAP | Despatch of communication of intention to grant a patent |
Free format text: ORIGINAL CODE: EPIDOSNIGR1 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: GRANT OF PATENT IS INTENDED |
|
INTG | Intention to grant announced |
Effective date: 20211117 |
|
GRAS | Grant fee paid |
Free format text: ORIGINAL CODE: EPIDOSNIGR3 |
|
GRAA | (expected) grant |
Free format text: ORIGINAL CODE: 0009210 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE PATENT HAS BEEN GRANTED |
|
AK | Designated contracting states |
Kind code of ref document: B1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
REG | Reference to a national code |
Ref country code: GB Ref legal event code: FG4D Free format text: NOT ENGLISH |
|
REG | Reference to a national code |
Ref country code: CH Ref legal event code: EP |
|
REG | Reference to a national code |
Ref country code: AT Ref legal event code: REF Ref document number: 1490450 Country of ref document: AT Kind code of ref document: T Effective date: 20220515 |
|
REG | Reference to a national code |
Ref country code: IE Ref legal event code: FG4D Free format text: LANGUAGE OF EP DOCUMENT: FRENCH Ref country code: DE Ref legal event code: R096 Ref document number: 602019014468 Country of ref document: DE |
|
REG | Reference to a national code |
Ref country code: LT Ref legal event code: MG9D |
|
REG | Reference to a national code |
Ref country code: NL Ref legal event code: MP Effective date: 20220504 |
|
REG | Reference to a national code |
Ref country code: AT Ref legal event code: MK05 Ref document number: 1490450 Country of ref document: AT Kind code of ref document: T Effective date: 20220504 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: SE Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20220504 Ref country code: PT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20220905 Ref country code: NO Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20220804 Ref country code: NL Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20220504 Ref country code: LT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20220504 Ref country code: HR Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20220504 Ref country code: GR Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20220805 Ref country code: FI Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20220504 Ref country code: BG Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20220804 Ref country code: AT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20220504 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: RS Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20220504 Ref country code: PL Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20220504 Ref country code: LV Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20220504 Ref country code: IS Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20220904 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: SM Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20220504 Ref country code: SK Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20220504 Ref country code: RO Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20220504 Ref country code: ES Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20220504 Ref country code: EE Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20220504 Ref country code: DK Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20220504 Ref country code: CZ Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20220504 |
|
REG | Reference to a national code |
Ref country code: DE Ref legal event code: R097 Ref document number: 602019014468 Country of ref document: DE |
|
PLBE | No opposition filed within time limit |
Free format text: ORIGINAL CODE: 0009261 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: NO OPPOSITION FILED WITHIN TIME LIMIT |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: AL Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20220504 |
|
26N | No opposition filed |
Effective date: 20230207 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: SI Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20220504 |
|
REG | Reference to a national code |
Ref country code: CH Ref legal event code: PL |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: LU Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20230111 |
|
REG | Reference to a national code |
Ref country code: BE Ref legal event code: MM Effective date: 20230131 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: LI Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20230131 Ref country code: CH Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20230131 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: BE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20230131 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: GB Payment date: 20231219 Year of fee payment: 6 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: IT Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20220504 Ref country code: IE Free format text: LAPSE BECAUSE OF NON-PAYMENT OF DUE FEES Effective date: 20230111 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: FR Payment date: 20231219 Year of fee payment: 6 |
|
PGFP | Annual fee paid to national office [announced via postgrant information from national office to epo] |
Ref country code: DE Payment date: 20231219 Year of fee payment: 6 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: MC Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20220504 |
|
PG25 | Lapsed in a contracting state [announced via postgrant information from national office to epo] |
Ref country code: MC Free format text: LAPSE BECAUSE OF FAILURE TO SUBMIT A TRANSLATION OF THE DESCRIPTION OR TO PAY THE FEE WITHIN THE PRESCRIBED TIME-LIMIT Effective date: 20220504 |